Net Neutrality Committee Report

Total Page:16

File Type:pdf, Size:1020Kb

Net Neutrality Committee Report NET NEUTRALITY DoT Committee Report May 2015 ACKNOWLEDGEMENTS “Appreciation is the highest form of prayer, for it acknowledges the presence of good wherever you shine the light of your thankful thoughts” ALAN COHEN Every journey starts with a step. The committee commenced its journey in the midst of a vigorous debate that questioned different dimensions – constitutional, economic, technical and commercial. During its journey through consultative pro- cess, the committee was exposed to the wisdom existing in the digital community in India including civil society, OTT players, Telecom Service Providers and others. toThe the committee vexed issue. was The gratified committee by the takes approach this opportunity adopted by to thankall participants one and all in who the travelledconsultations with to the constructively committee on support this journey and advise for their the committeeconstructive in approach,finding a path the studied advice and support. The committee hopes that its report will be under- stood in this spirit of constructive co-operation. Our nation faces several develop- mental challenges and many of these challenges can be resolved through solutions emerging from the digital space. The committee has drawn inspiration from this thought and approached the issue with the diligence expected of it and is conscious of the burden that its recommendations may affect the course of policy for years to come. First of all, the committee would like to thank all participants in consultations and respectfully acknowledges their contributions and advice. The volumes of sugges- tions, data, research papers and supporting documents presented to the committee represent the robust and active participation of all participants in this consultative exercise. No other consultation exercise in the Department of Telecommunications has seen the participation of such a wide range of participants from academics to activists and service providers to users. agencies that helped us examine the issues from different public policy perspec- tives.The committee The committee has also is benefittedindebted to from Shri the G Pinputs Srivastava provided and by Shri other Shrikant government Panda from the Department of Telecommunications for their valuable contribution. The committee constituted a Working Group to sift through the mass of suggestions and papers and assist it in its work. Immense effort has been put in by this working group to do the background research and spent many sleepless nights in stitch- ing together the wide diversity in thoughts encountered during consultations. The completion of the report would not have been possible in the short time that it had but for their dedicated efforts. Our special appreciation goes out to this group of young, dynamic officers - Abhay Shanker Verma, YGSC Kishore Babu, N S Deepu, whoBrajesh worked Mishra, tirelessly Radhacharan and cleared Shakya, the J. pathRamesh, for us Bijoy to bring Kumar clarity Nath, in G. our Brahmaiah, journey. Gulab Chandra Rai, R. Saji Kumar, Ritu Pande, Jitendra Kumar and Pankaj Salodia The committeecommittee isrecognises indebted tothat these some young work officers has been and wishesdone, a them lot more a bright is needed future. to mull over these recommendations and translate them into policy actions. The committee hopes that its recommendations bring some clarity to a heated debate and brings all players in digital space together in carrying forward the enormous for whom the digital space can be liberating. potential that exists in our country to fulfil the aspirations and dreams of the young The committee submits this report and hopes that as one journey ends, another starts in a spirit of constructive co-operation. (Chairman) A.K. Bhargava A.K. Mittal Shashi Ranjan Kumar (Member) (Member) (Member) V. Umashankar G. Narendra Nath R.M. Agarwal (Member) (Member Convener) Contents CHAPTER 1 - INTRODUCTION .......................................................................................................... 9 CHAPTER 2- NET NEUTRALITY – THE WAY WE UNDERSTAND ...................................... 12 CHAPTER 3 - NET NEUTRALITY – INTERNATIONAL SCENARIO .................................... 16 .............................. 20 CHAPTER 4 - STAKEHOLDER PERSPECTIVE OF NET NEUTRALITY ............................. 32 CHAPTER 5 - INNOVATION, INVESTMENT & ENTREPRENEURSHIP ............................. 35 CHAPTER 76 - INTERNET:PUBLIC POLICY FREEDOM PERSPECTIVE OF EXPRESSION OF NET NEUTRALITY AND USER RIGHTS ................ 41 ................................ 44 CHAPTER 8 - OTT SERVICES AND IMPACT ON TELECOM ........................................................... SECTOR 50 CHAPTER 9 - NET NEUTRALITY & IMPACT ON TSPs ........................................ 54 CHAPTER 10 - TRAFFIC MANAGEMENT & NET NEUTRALITY ........................................................................................................................... 61 CHAPTER 11 - CONTENT DELIVERY, INTERCONNECTION & MANAGED SERVICES .......................................................................... 65 CHAPTER 12 - TARIFFS & NET NEUTRALITY .............................................. 71 CHAPTER 13 - LEGAL, LICENSING & REGULATORY........................................................................... ISSUES 76 CHAPTER 14 - SECURITY & PRIVACY ISSUES ........................... 79 CHAPTER 1516 - ENFORCEMENT,WAY FORWARD ....................................................................................................... OVERSIGHT & CAPACITY BUILDING 82 CHAPTER 17 - SUMMARY OF RECOMMENDATIONS............................................................. 85 ................................................................. 90 ANNEXURE-I - NOTIFICATION OF GOVERNMENT ............................................................ 91 ANNEXURE-II - LIST OF INVITEES / PARTICIPANTS .................................................................. 97 ANNEXURE-III - LIST OF RESPONSES RECEIVED .............................................................................102 GLOSSARYANNEXURE-IV .............................................................................................................................................. - SUGGESTED GUIDELINES 103 REFERENCES ........................................................................................................................................105 NET NEUTRALITY - DoT Committee Report - May 2015 CHAPTER 1 INTRODUCTION “The internet is a reflection of our society and that mirror is going to be reflecting what we see. If we do not like what we see in that mirror the problem is not to fix the mirror, we have to fix society.” — VINT CERF 1.1 The Internet has transformed the world and society like never before. It has provided a platform for new opportunities through innovation. Internet has fostered the supremacy of ideas rather than capital. It is a universal platform that uses the same standards in every country, so that every user can connect to every other user with physical distances becoming irrelevant in the networked world. The Internet is a public resource that has no ownership, but is available to all those who are digitally connected. 1.2 In India, tremendous growth in telecommunications and convergence of communication and information technologies has created a unique digital platform for advancing the developmental goals. Digital India programme envisions access to digital infrastructure as a utility to every citizen, thereby making available high speed broadband internet as a core utility for delivery of services to citizens. The program envisions e-governance and services on demand and aims at digital empowerment of citizens. 1.3 India has demonstrated to the world its capacity to develop innovative business models in affordable mobile telephony suited to the requirements of a developing country. It has 997 million1 telecom subscribers and 99.20 million broadband subscribers with an access to internet at speeds higher than 512 kbps. Out of about 300 million2 subscribers accessing the internet, wire line media. Currently, both broadband and internet penetration in India isaround comparatively 93% subscribers low in the are global on wireless context. media, whereas 7% are on fixed 1 2 IAMAI Report The Indian Telecom Services Performance Indicators, October – December, 2015; TRAI report Jan 2015 9 Chapter 1 - Introduction 1.4 The telecom industry worldwide has experienced a paradigm shift from traditional voice to data. The rapid adoption of smart devices, availability of useful applications and online services are leading to significant amount tremendousof data traffic increase over the in networks.consumption The of increase bandwidth. in internet In India, and despite broadband rapid growthpenetration in data with in recentthe humongous years, voice growth continues in data to be traffic, predominant has led in to the a years, the growth in voice revenues is slowing down and may perhaps start reducingtelecom space in coming both inyears. terms of revenues and traffic. However, in the last few 1.5 There is a constant pressure for investment in network infrastructure and to expandIn India, capacities Internet trafficand increase is likely penetration. to increase Telecommanifold infrastructure, in the next few being years. a meet the network capacity demands brought about by increasing broadband penetration,capital intensive increasing industry, speeds will require and increasing significant data investments usage. Telecom by operators
Recommended publications
  • Why People Are Showrooming—72 Percent Simply Find a Better Price
    14 VIRTUAL BANKING Aman Narian, global head of digital with Standard Chartered Bank, sums up this vast uncharted territory well: We are at the beginning of the beginning when it comes to mobile . we have still not used the hardware and software integration of a mobile phone—voice message tags, talk to your mobile banking app . biometrics with touch ID coming to iPhone . there is much to do. .”2 Aman sums up how much of the banking industry thinks about mobile— as a vast uncharted territory. Consider ING DIRECT Canada (recently re- named Tangerine). Eighteen percent of today’s banking transactions are happening on mobile phones; that number was zero two years ago. More than 12 percent of all money transfers, 18 percent of all bill payments, and 17 percent of e‐mail money transfers are now conducted using mobile phones. 3 Mobile devices are becoming consumers’ primary computing device, and with that, a new set of possibilities open up for fi nancial institutions interested in capturing new markets. These new markets come about as a result of the unique software and hardware attributes associated with a mobile device. Customer expectations have skyrocketed now that mobile can bring rich, personalized experiences to any smartphone. And as a result, it’s more important than ever for fi nancial institutions and commerce companies to operate with a “mobile fi rst” mind‐set. We are already seeing examples of how users are leveraging their mobile devices to disrupt the traditional re- tail commerce paradigm in the form of “showrooming.” Consumers will look in physical stores, and then simply look up the item on the mobile phone and order it.
    [Show full text]
  • NET NEUTRALITY Work Operator
    Database NET NEUTRALITY work operator. In October 2007, Comcast was ac- cused of secretly deploying filtering technologies to manage its network in order to keep some peer-to- Net neutrality denotes the neutral transmission of peer traffic from overloading its network and hence data via the Internet, i.e., every packet of data, affecting the accessing speeds of its other Internet regardless of its content, origin and the application subscribers. The FCC deemed it unreasonable for that created it, is treated the same way and the best Comcast to discriminate against particular Internet effort should always be made to forward it.This con- applications and not to disclose its practice ade- cept is often regarded as a fundamental characteris- quately to its customers and therefore ruled against tic of the Internet. However, the amount of data that Comcast’s practices of throttling Internet traffic and is transported via the Internet is increasing rapidly, delaying peer-to-peer traffic. Comcast appealed to especially because of applications like music and vi- the US Court of Appeals, claiming that no legally deo downloads, Internet TV,and Internet telephony. enforceable standards or rules on the matter existed. All these applications require large capacities. This In April 2010 the federal appeals court ruled that the may lead to a capacity overload and delays of data FCC had limited power over Internet traffic under transmissions.The current technological state allows current law. This decision allows network operators for assigning different priorities to different data to block or slow specific sites and charge sites to packets. Therefore, the discussion has emerged deliver their content faster to users.
    [Show full text]
  • AB 1699 Page 1
    AB 1699 Page 1 Date of Hearing: April 30, 2019 ASSEMBLY COMMITTEE ON PRIVACY AND CONSUMER PROTECTION Ed Chau, Chair AB 1699 (Levine) – As Amended April 22, 2019 SUBJECT: Telecommunications: public safety customer accounts: states of emergency SUMMARY: This bill would prohibit, among other things, a mobile internet service provider (ISP) from impairing or degrading the lawful internet traffic of its public safety customer accounts, subject to reasonable network management, as specified, during a state of emergency declared by the President or the Governor, or upon the declaration of a local emergency by an official, board, or other governing body vested with authority to make such a declaration in any city, county, or city and county. This bill would state that the Legislature finds and declares that this bill is adopted pursuant to the police power granted to the State of California under the United States Constitution and cannot be preempted by the Federal Communications Commission (FCC), and that the bill ensures police and emergency services personnel have access to all of the resources necessary for them to operate effectively during a state of emergency. EXISTING LAW: 1) Declares it unlawful for a fixed or mobile ISP, insofar as the provider is engaged in providing fixed broadband internet access service, to engage in certain activities, including, among other things: Blocking lawful content, applications, services, or nonharmful devices, subject to reasonable network management. Impairing or degrading lawful internet traffic on the basis of internet content, application, or service, or use of a nonharmful device, subject to reasonable network management. Unreasonably interfering with, or unreasonably disadvantaging, either an end user’s ability to select, access, and use broadband internet access service or the lawful internet content, applications, services, or devices of the end user’s choice, or an edge provider’s ability to make lawful content, applications, services, or devices available to end users, subject to reasonable network management.
    [Show full text]
  • Some Skepticism About Search Neutrality
    University of Maryland Francis King Carey School of Law DigitalCommons@UM Carey Law Faculty Scholarship Francis King Carey School of Law Faculty 2010 Some Skepticism About Search Neutrality James Grimmelmann University of Maryland Francis King Carey School of Law, [email protected] Follow this and additional works at: https://digitalcommons.law.umaryland.edu/fac_pubs Part of the Digital Communications and Networking Commons Digital Commons Citation James Grimmelmann. "Some Skepticism About Search Neutrality" The Next Digital Decade: Essays on the Future of the Internet. Ed. Berin Szoka & Adam Marcus. TechFreedom, 2010. 435-459. This Book Chapter is brought to you for free and open access by the Francis King Carey School of Law Faculty at DigitalCommons@UM Carey Law. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of DigitalCommons@UM Carey Law. For more information, please contact [email protected]. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 435 Some Skepticism About Search Neutrality By James Grimmelmann* The perfect search engine would be like the mind of God.1 The God that holds you over the pit of hell, much as one holds a spider, or some loathsome insect, over the fire, abhors you, and is dreadfully provoked; his wrath towards you burns like fire; he looks upon you as worthy of nothing else, but to be cast into the fire 2 If God did not exist, it would be necessary to invent him.3 Search engines are attention lenses; they bring the online world into focus. They can redirect, reveal, magnify, and distort.
    [Show full text]
  • +Intelligence a New Era for Industry Verticals
    Special Edition | 10.2017 +intelligence A New Era For Industry Verticals Scan for mobile reading +Intelligence: A new era is coming To thrive in the global digital economy, enterprises in all industry verticals must plan and execute digital transformation strategies that go beyond smart and enter the +Intelligence era – an era of cloud backed by big data and AI. Broadband connects the data center networks that provide cloud services like computing and storage and enable platform and sharing economy models such as XaaS and pay-per-use. IoT provides the huge volumes of data that feed in the cloud for ubiquitous AI analytics to provide actionable insights for enterprises. By 2025, 100 billion devices will be connected on pervasive 5G networks, generating huge amounts of data. For business, this data will enable a true customer-first approach, enabling fully personalized products, solutions, and services. Digital infrastructure and virtualization will forge mature vertical-spanning ecosystems that bring together disparate industry cogs to form coherent value chains and deliver unprecedented efficiency and precision. And enterprises need to get smart with digital transformation if they don’t want to be left behind. However, reaching this point isn’t easy. Nor is choosing the right transformation path to follow and then seeing it through. Enterprises need partnerships. And they need the right solutions to move forward over the next decade. Telcos – the drivers and enablers of digital transformation – face ten possible transformation journeys and five destinations, each requiring a specific strategy. Slow- to-change and diverse in nature, manufacturing must overhaul outdated legacy IT infrastructure to evolve into Industry 4.0 and the age of data-led productivity and mass customization.
    [Show full text]
  • Zscaler Bandwidth Control Ensures Your Mission-Critical Applications, Like Office 365, Don’T Take a Back Seat to Youtube, OS Updates, and Streaming Content
    DATA SHEET Zscaler™ Bandwidth Control Prioritize business applications over recreational traffic Zscaler Bandwidth Control ensures your mission-critical applications, like Office 365, don’t take a back seat to YouTube, OS updates, and streaming content. The challenge of managing bandwidth in a UTM/Firewall Appliance Sprawl cloud world Leading organizations are moving toward local Internet breakouts to ensure a fast user experience and realize the full agility and cost-saving benefits of the cloud. With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, Spotify, and other recreational traffic like live-streaming sporting events. One way to route traffic locally and police bandwidth is to deploy next- generation firewalls or UTM appliances in each location, but this approach creates costly, unmanageable appliance sprawl. User experience also HQ DATA CENTER suffers with an appliance-based approach because appliances are not designed for bandwidth shaping and will drop packets and interrupt streaming video. And, because this approach is implemented in the last mile, instead of the cloud, the enterprise itself remains vulnerable to bottlenecks and bandwidth contention. Break Free with Zscaler A better approach: Zscaler Bandwidth Control With the majority of your users and applications in the cloud, and most of your traffic now bound for the Internet, it makes sense to move your security and controls to the cloud, too. By implementing Zscaler Bandwidth Control — part of the Zscaler Cloud Security Platform — you can route traffic locally to the Internet, providing great performance and the same level of protection for all users, across all locations.
    [Show full text]
  • The FCC Is Involved in a Never Ending Fight to Ensure Net Neutrality As a Law Volume 1 (2) 2015
    The FCC is Involved in a Never Ending Fight to Ensure Net Neutrality as a Law Volume 1 (2) 2015 Fast Lanes without Slow Lanes: The FCC is Involved in a Never Ending Fight to Ensure Net Neutrality as a Law Matthew C. Quattrochi* 1. Introduction The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.1 The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.2 Part II of this work will be dedicated to explaining net neutrality and addressing the overall question of whether net neutrality needs to be enacted into law. Part III will be dedicated to discussing Verizon v. F.C.C. and Comcast Corp. v. F.C.C. as well as other applicable case law concerning net neutrality violations. Part IV will address FCC Chairman Tom Wheeler’s most recent net neutrality proposal, now law. Part V will consider the authoritative options that the FCC has in regulating net neutrality violations. * Matthew C. Quattrochi is a 3rd Year law student at Barry Law School in Orlando Florida. He is an Orlando Chapter Attorney Liaison and the member of American Constitution Society.
    [Show full text]
  • FCC Jurisdiction Over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School
    Michigan Telecommunications and Technology Law Review Volume 15 | Issue 2 2009 FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School Follow this and additional works at: http://repository.law.umich.edu/mttlr Part of the Administrative Law Commons, Communications Law Commons, and the Internet Law Commons Recommended Citation Andrew Gioia, FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling, 15 Mich. Telecomm. & Tech. L. Rev. 517 (2009). Available at: http://repository.law.umich.edu/mttlr/vol15/iss2/7 This Note is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE FCC JURISDICTION OVER ISPS IN PROTOCOL-SPECIFIC BANDWIDTH THROTTLING Andrew Gioia* Cite as: Andrew Gioia, FCC Jurisdictionover ISPs in Protocol-SpecificBandwidth Throttling, 15 MICH. TELECOMM. TECH. L. REV. 517 (2009), available at http://www.mttlr.org/volfifteen/gioia.pdf I. INTRODUCTION ......................................................................... 518 I. TECHNICAL AND PROCEDURAL BACKGROUND ......................... 519 A . The BitTorrent Protocol..................................................... 519 B. Comcast's Protocol-SpecificDiscrimination Policy .......... 520 III. THE FCC
    [Show full text]
  • Oxygen-3 User Guide
    Oxygen-3 User Guide Model Oxygen-3 3066 Beta Avenue | Burnaby, B.C. | V5G 4K4 Sales: 1.877.985.2878 \ 604.294.4465 Revision Rev 1.9 Support: 1.844.462.9773 \ 778.462.9773 [email protected] Firmware Rev 5.0 Revision Control 2 Revision Control Description Revision Date Release Update 1.1 04-Mar-2015 Minor Update 1.2 23-Sep-2015 Update for firmware rev. 4.3 1.3 29-Sep-2015 Update for firmware rev. 4.4 - 4.5 1.4 18-Dec-2015 Update for firmware rev. 4.6 - 4.7 1.5 09-Jun-2016 Update for firmware rev. 4.8 1.6 11-Aug-2016 Added Chapter on WLAN 1.7 21-Sept-2016 Update for firmware rev. 4.9 1.8 09-Jan-2017 Update for firmware rev. 5.0 1.9 10-July-2017 Contents Revision Control .............................................................................................................................................. 2 Contents .......................................................................................................................................................... 2 1 Legal Notices ........................................................................................................................................... 6 1.1 Regulatory Restrictions ................................................................................................................... 6 1.2 Electromagnetic Interference (EMI) – United States FCC Information ........................................... 7 1.3 Electromagnetic Interference (EMI) – Canada Information ........................................................... 7 1.4 Li-Ion Battery ..................................................................................................................................
    [Show full text]
  • Study on Net-Neutrality Regulation
    BoR (17) 159 Final public report for BEREC Study on net-neutrality regulation 18 September 2017 James Allen, Andrew Daly, J. Scott Marcus, David de Antonio Monte, Robert Woolfson Ref: 2009152-254 . Study on net-neutrality regulation Contents 1 Executive summary 1 1.1 Background and purpose of the work 1 1.2 Overview of approach to tackling net neutrality in each country 1 1.3 Case studies of monitoring tools and techniques 3 1.4 Lessons learnt and concluding remarks 4 2 Introduction 6 2.1 Aim of the study 6 2.2 Summary of net neutrality 6 2.3 Approach to conducting the study 7 2.4 Structure of this document 7 3 Approach to tackling net neutrality in benchmark countries 8 3.1 The evolution of net-neutrality rules over time 8 3.2 Non-net-neutral practices 11 3.3 Transparency obligations on ISPs in relation to practices which may affect net neutrality 19 3.4 Monitoring and supervision by NRAs 22 3.5 Legal mechanisms for enforcement of net neutrality by NRAs 24 3.6 Reporting by NRAs 25 4 Case studies 26 4.1 Chile: Adkintun 26 4.2 Chile: Sistema de Transferencia de Información (STI) 27 4.3 USA: Netalyzr 28 4.4 USA: Measuring Broadband America programme 28 5 Lessons learnt and concluding remarks 33 Annex A Tools and techniques available to detect and characterise non-net-neutral practices Ref: 2009152-254 . Study on net-neutrality regulation Copyright © 2017. Analysys Mason Limited has produced the information contained herein for BEREC. The ownership, use and disclosure of this information are subject to the Commercial Terms contained in the contract between Analysys Mason Limited and BEREC.
    [Show full text]
  • Federal Communications Commission FOIA Request Log, July 2015
    Federal Communications Commission FOIA request log, July 2015 - June 2016 Brought to you by AltGov2 www.altgov2.org/FOIALand Tracking Number Requester Organization Submitted Due Closed Date Status Dispositions Detail We are writing in relation to Nobel Financial Ltd. ("the Company"), a company which is in the process of being licensed as an electronic money institution in terms of the Financial Institutions Act. The MFSA has been informed that Mr. Micaiah Drew Poleate will be appointed as Executive Vice President and Senior Manager of the Company. We undestand that Mr. Poleate may be known to the US Federal Communications Commission ("FCC") in view of his past involvement as Financial Analyst of Nobel Limited Company LLC, during the period February 2002 to December 2006, which we understand is a company regulated by the FCC. In this regard, we would appreciate if you could kindly confirm whether: a) our understanding is correct; b) Mr. Poleate is currently held in good-standing by the FCC; c) there have been any complaints against Mr. Poleate in connection with which the FCC has or will be taking action; and d) Mr. Poleate has ever FCC-2015-000595 Malta Financial Services Authority 06/30/2015 07/29/2015 07/20/2015 Closed No records been subjected to any censure or criticism and/or disciplinary proceeding by the FCC. FCC-2015-000596 06/30/2015 08/12/2015 08/03/2015 Closed Partial grant/partial denial PLEASE SUPPLY ANY AND ALL RECORDS INVOLVING KG5IDD AND FILE NUMBER 0006853120 FCC-2015-000597 06/30/2015 08/12/2015 08/03/2015 Closed Partial grant/partial denial ANY AND ALL RECORDS ON WD5GXH • A copy of information exchanged between the office of the president or his national security staff and the NTIA regarding preparations for the 2012 World Conference on International Telecommunications (WCIT) negotiations, negotiating stance, the desired outcome of the negotiations, proposals , reservations, and/or concerns about the WCIT process.
    [Show full text]
  • How to Tell If Your ISP Is Throttling and How to Avoid It by Joe Zahl
    http://www.bitvpn.net How to Tell if Your ISP is Throttling and How to Avoid It by Joe Zahl Has your Internet suffered from a slow connection without any reason? Or do you often meet buffering when streaming Netflix or YouTube? It possibly derives from Internet throttling. Here comes a guide on how to check and stop it. What is Throttling? Throttling refers to a process during which Internet Service Providers, or ISPs, intentionally slow down Internet users’ data transmission. Throttling occurs so that you suffer from a slow Internet connection from time to time. You won’t be informed by ISPs of the unexpected slow Internet connection, so it usually leads you to be depressed because of the uncertainty of the data capping. Up to now, the whole Internet connection gets throttled. However, with the abolishment of net neutrality, some people start to become worried that only specific online content will be limited by ISP. Better, it’s not the overall issue. Why do ISPs Throttle Internet? ISPs have more than one “excuse” to throttle your bandwidth. Traffic Congestion During the time when large online traffic is being used, everyone’s data is usually throttled by ISP so that everyone is able to have access to the Internet. Otherwise, some users enjoy the highest speed while others fail to connect at all. Traffic congestion usually takes place during rush hour, from 7 pm to 11 pm. http://www.bitvpn.net Data Caps If your data transmission lowers to the bottom, it’s possible that your Internet speed reaches a top limit.
    [Show full text]